Cryptanalysis and Brute-force attackThe main objective of breaking the cipher is to discover the key rather than just recover the plaintext of a single ciphertext. This is…Mar 19, 2021Mar 19, 2021
Caesar CipherIn Caesar Cipher, to encrypt a plaintext(message), each plaintext characters are replaced by three letters down the alphabet. For example…Mar 14, 2021Mar 14, 2021
Techniques for hiding messagesThe CIA triad security goals can be achieved through the following two techniques:Mar 14, 2021Mar 14, 2021
Security MechanismsThe security mechanism is a process or device incorporating such a process that is designed to detect, prevent or recover from a security…Mar 14, 2021Mar 14, 2021
Security ServicesSecurity service is service provided by layers of communicating open systems which ensure adequate security of data storage system or data…Mar 14, 2021Mar 14, 2021
Types of Security AttackPassive Attack: Security attacks such as eavesdropping or monitoring the transmission of data to obtain information without affecting the…Mar 13, 2021Mar 13, 2021
Familiarization of JargonCryptography: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their…Mar 13, 2021Mar 13, 2021
Information SecurityIn this information era, we live in a world of information. Information is collected, curated, and sold like a commodity. Information has…Mar 12, 2021Mar 12, 2021